logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Operating Systems Concepts Comments

  • Question
  • What problem is solved by Dijkstra's banker's algorithm?


  • Options
  • A. mutual exclusion
  • B. deadlock recovery
  • C. deadlock avoidance
  • D. cache coherence
  • E. None of the above

  • Correct Answer
  • deadlock avoidance 

    Explanation
    The Banker's algorithm is a resource allocation & deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of pre-determined maximum possible amounts of all resources, and then makes a "safe-state" check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.

  • Operating Systems Concepts problems


    Search Results


    • 1. Operating system

    • Options
    • A. links a program with the subroutines it references
    • B. provides a layered, user-friendly interface
    • C. enables the programmer to draw a flowchart
    • D. all of the above
    • E. None of the above
    • Discuss
    • 2. Block caches or buffer caches are used

    • Options
    • A. to improve disk performance
    • B. to handle interrupts
    • C. to increase the capacity of the main memory
    • D. to speed up main memory read operation
    • E. None of the above
    • Discuss
    • 3. In which way(s) a macro processor for assembly language can be implemented:

    • Options
    • A. independent two-pass processor
    • B. independent one-pass processor
    • C. processor incorporated into pass 1 of a standard two-pass assembler
    • D. all of the above
    • E. None of the above
    • Discuss
    • 4. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

    • Options
    • A. Partitioning
    • B. Multitasking
    • C. Windowing
    • D. Paging
    • E. None of the above
    • Discuss
    • 5. Trojan-Horse programs

    • Options
    • A. are legitimate programs that allow unauthorized access
    • B. do not usually work
    • C. are hidden programs that do not show up on the system
    • D. usually are immediately discovered
    • E. None of the above
    • Discuss
    • 6. The function(s) of the Storage Assignment is (are)

    • Options
    • A. to assign storage to all variables referenced in the source program.
    • B. to assign storage to all temporary locations that are necessary for intermediate results.
    • C. to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.
    • D. all of the above
    • E. None of the above
    • Discuss
    • 7. Which of the following is a type of systems software used on microcomputers?

    • Options
    • A. MS-DOS
    • B. PC-DOS
    • C. Unix
    • D. All of the above
    • E. None of the above
    • Discuss
    • 8. Producer consumer problem can be solved using

    • Options
    • A. semaphores
    • B. event counters
    • C. monitors
    • D. all of the above
    • E. None of the above
    • Discuss
    • 9. If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is

    • Options
    • A. 16
    • B. 32
    • C. 64
    • D. 128
    • E. None of the above
    • Discuss
    • 10. Software that measures, monitors, analyzes, and controls real-world events is called:

    • Options
    • A. system software
    • B. real-time software
    • C. scientific software
    • D. business software
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment